Free Essay

Information and Systems Technology - Ping Sweeps

In:

Submitted By ericthered
Words 655
Pages 3
Ping sweeps and ports scans are common methods for hackers to try to break a network. As a system administrator this is a valid concern and for the boss this should not be a worry for him. The system administrator has a lot of steps to stop efforts from hackers to acquire any data by using ping sweeps and ports scans. If hackers are constantly thwarted and discouraged from penetrating your network they normally move on to another site. With proper instruction, the right software and sufficient support, one can take necessary steps in preventing malicious types of activities in a network. Port scans and ping sweeps may seem dangerous, but they can also be understood and monitored in order to identify and defend against network threats.
Port scans (as its name implies) directed to ports and the response received gives the hacker an idea of the systems integrity and to help set them up for a later intrusion. Port scans are the most common probing tool available. Port scans take ping sweeps to a different level. Port scans actually “look” at a machine that is alive and scan for an open port. Once the open port is found, it scans the port to find the service it is running. All machines connected to a Local Area Network or Internet run many services that connects at well-known and not so well known ports. A port scan helps the attacker find which ports are available. Essentially, a port scan consists of sending a message to each port, one at a time. The kind of response received indicates whether the port is used and can therefore be probed further for weakness.
Protecting the machines from such attacks can be very easy. One important rule is to remember at all times to assume vulnerability. No one machine on a network is completely safe from an intruder. The best way to protect the machine is not to expose any important security information on a machine. Passwords, SSN, financial information and password hints should be kept on an encrypted flash drive. Keeping this information stored on a computer is like having the password to an ATM card in your purse or wallet. It allows the intruder to get your information faster.
A ping sweep is a basic networking scanning technique used to determine which range of IP addresses map to live hosts. A single ping will tell whether one specified host computer exists on the network. A ping sweep consists of Internet Control Message Protocol (ICMP) Echo requests sent to multiple hosts, this is done to determine which machines are alive and which ones aren’t. If a given address is live, it will return an ICMP Echo reply. Once the hacker knows which machines are alive, he or they can focus on which machines to attack and work from there. Not only hackers perform ping sweeps, system administrator may be trying to find out which machines are alive on a network for diagnostics reasons. The system administrator can use ping sweeps for trouble shooting purposes or even for licenses issues. Pings sweeps should be detected by an Intrusion Detection System, but to avoid potential DOS attacks, or intrusions, system administrators need to use other methods to test connectivity. Since using ping sweep can help hacker, one can have the ping sweep turned on only when someone is testing the network connectivity.
The first step to network security is to know what is happening. If you don't have firewalls or IDS systems, then you have no way of even knowing that you are probably getting scanned multiple times daily, and if you are running services such as remote login (SSH, RDP) then you are already under attack. You need to implement IDS such that attacks are immediately addressed. It is not free. It costs time and/or money whether you do it in-house or use a third party.

Similar Documents

Free Essay

Ping Sweeps and Ports Scans Description

...THESIS STATEMENT Infamous computer activities, such as port scans and ping sweeps, which can lead to intrusion of systems of a company or network, which enables the intruders to gain access to the systems and do changes in the settings or extract important information. These activities can be detected and stopped or prevented using special skills tool set. INTRODUCTION One of the most common disreputable computer activities are ping sweeps and port scans. They lead to breach of systems by intruders which can harm the whole system or network protocols. There are millions of entities around the world that utilize the internet and the problem is that, many are unaware of the threats and vulnerabilities that are lurking around. These probes can be detected and prevented for to be in a safe position rather than compromise. Ping Sweep and Port Scans Events Two methods that are used to attack a network is ping sweep and port scans. These activities can be used with malicious intent against, as well as, in effort to try to protect a network. Ping sweeps and port scans has been a notorious and yet a useful tool for hackers and system administrators. Ping sweeps and port scans at times can be a bother to both system administrators and network managers. Ping sweeps and port scans work together and can be dangerous but it also can be prevented. A ping sweep, also known as an internet control message protocol sweep (ICMP) is a basic network scanning technique used to determine the...

Words: 648 - Pages: 3

Free Essay

Ping Sweeps and Port Scans

...Ping Sweeps and Port Scans Ping sweeps and ports scans are a common ways for hackers to probe a network and attempt to break into it. Although network probes are technically not intrusions themselves, they should not be taken lightly—they may lead to actual intrusions in the future. In the information that follows, I will provide a standard definition of a ping sweep and port scan, the possible uses of the two, and the prevention methods which are in place in our company to combat ping sweeps and port scans of our network by would be attackers. According to Whatis.com, a ping sweep is a basic networking scanning technique used to determine which range of IP addresses are mapped to active computers. During a ping sweep, Internet Control Message Protocol (ICMP) Echo requests are sent to many computers, which determines which are active and which are not ("What is ping sweep (ICMP sweep)? - Definition from Whatis.com," n.d.). If a given address is active, it will return an ICMP Echo reply and the attacker will then focus on those machines. Hackers are not the only ones who perform ping sweeps. I use ping sweeps to find out which machines are active on the network for diagnostics reasons and our ISP (Internet Service Provider) uses automated ping operations to monitor their connection. Disabling the ICMP protocol is one option to prevent ping sweeps; however, doing so may cause problems with our ISP leading them to think that the connection is not functioning because their...

Words: 814 - Pages: 4

Premium Essay

Netw280

...Ping Sweeps and Port Scans Ashlee Jackson Devry University PING SWEEPS AND PORT SCANS Port scans are used to find which ports are open and show what may possibly be running on the target machine(s) from the ping sweep. The intruder will send specially formatted data packets to the ports to get more information, such as: operating system, running applications, etc. This still is not a direct threat, but the intruder is slowly grabbing information that will reveal the vulnerabilities within the computer. When created, the intruder can gain access to the target machine and destroy the target from the inside. Once an open port is found and vulnerable, an average programmer can Ping Sweeps and port scans are something that every network will most likely have happen to it at some point. While these two things themselves are not intrusive to your network, they can uncover holes or vulnerabilities in your network that can be exploited and used for malicious behavior It is safe to say that any large network at some point has been probed by something like a port scan or a ping sweep. These types of probes should not be taken lightly. They can be used to uncover certain vulnerabilities in your network and be used as ways to gain access. The use of computers in this generation has been a necessity. A lot of companies depend on computers to operate their business which is why it is essential...

Words: 1333 - Pages: 6

Free Essay

Sec280-Week1

...a network is hacked, there is a possible threat to other systems getting effected as well. These security breaches can be severe to the organization information and privacy and resolve into a loss of information, leak of confidential data such as bank accounts, and loss of goodwill and trust. Ping Sweeps and Port Scans Intro Ping sweeps and port scans are two methods commonly used by hackers to detect vulnerabilities on computer networks (InfoSoc, 2014). Hackers use ping sweeps to check on which computers are active and being used; while they use port scan to find open ports which can be used to breach a network. If these two methods are used by knowledgeable hackers, they can jeopardize personal data and cause severe effects on the entire computer network. Ping Sweep Ping is the abbreviation for Packet Internet Groper. It is a service to check if a machine on the network is up and running. In ping sweep, an Internet Control Message Protocol (ICMP) echo request is sent to a machine to see if it responds. If a machine is live, it will send an echo ICMP response. Hackers use this facility to seek targets in large networks. They use ping sweeps to continuously ping addresses, leading to a slowdown in the network. “It’s a bit like knocking on your neighbors’ door at 3 a.m. to see who’s sleeping and who’s not” (Lawrence, 2001). Fping is a utility that is used for ping sweeps and unlike normal ping it sends one ping packet to one IP address, and then proceeds immediately to...

Words: 1279 - Pages: 6

Premium Essay

Ping Sweeps

...Ping Sweeps and Port Scans Devry University SEC-280-13755 Principles Info Sys Security 9/9/2012 Ping Sweeps and Port Scans There are various problems that organizations will face as a cost of doing business. Ping sweeps and port scans are noteworthy because they can affect normal operations. As technology advances, so do the inevitable threats to our cyber security. Ping sweeps and port scans are examples of the threats that most organizations are likely to face. These two probes are the two major and fundamental ways through which hackers and crackers will assess the vulnerabilities of our infrastructure and design a plan to break in (Baskin, 2008). It is important that our organization understands the two primary attacks and their approach so that we can prevent them from taking place and proactively mitigate our risk of attack. Our competitive world and fast-paced market dictates that we effectively decrease our exposure to cyber attacks to protect the integrity of our data and infrastructure due to attack resulting from port scans or ping sweeps. The term “ping sweep” is a process that involves the attacker learning more about the functioning of our existing systems. For instance, if an attacker attempts to breach our servers, he or she will be able to detect if the system is active by performing a ping sweep. This will likely be an attacker’s first step in their attempts to probe our organization for vulnerabilities. The results of the ping sweep...

Words: 774 - Pages: 4

Free Essay

Business and Management Related Literature Study Habits Chapter Ii

...constant attention to get moderate performance. Advances in digital circuitry and digital signal processing led to modern survey echosounders with high resolution, high precision and good long-time frequency stability. Improvements in transducer materials and design led to narrow-shaped beams capable of resolving small targets on the seabed. When the echosounders replaced the leadline, there was no longer regular sampling of the seabed type. Instead, CHS hydrographers have developed ways to use acoustic backscatter to determine the type of seabed. Sidescan sonar Because the single-beam echosounder is aimed vertically, it cannot capture information on depth or hazards in the spaces between sounding lines. Sidescan sonar grew out of the idea of tilting a broad-beam echosounder to one side to produce a time series of acoustic returns. This technology has narrow along-track beam width and high across-track resolution. Sidescan sonars work well for identifying seabed obstacles between sounding lines, but cannot locate those targets precisely or measure the least depth accurately. This inexactness arises from the technical assumption used in sidescan sonar measurements that the...

Words: 909 - Pages: 4

Free Essay

Designing for Security

...various THREATS to network security, the FUNDAMENTAL goals of network security, and how LAYERED approaches to defense contributed to the overall security posture of an organization’s information infrastructure. Chapter 2 explored Transmission Control Protocol / Internet Protocol (TCP/IP), the Open Systems Interconnect (OSI) Model, and how various protocols operated within, as well as across OSI layers to enable telecommunications to function. In a scholarly peer-reviewed journal article entitled: "Cyber security in the Smart Grid: Survey and challenges," Wang and Lu (2013) examined security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the U.S. Smart Grid. Based upon what you read in Chapters, one, and two of Weaver et al. (2013), as well as the journal article, COMPARE and CONTRAST Vulnerabilities, Attacks, or Threats shared from the text against those provided within the journal article. IDENTIFY Three Similarities AND Three Differences that exists between the text and literature. Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), 1344-1371. Weaver, R., Weaver, D., & Farwood, D. (2013). Guide to Network Defense and Countermeasures (third Ed.). Boston, MA: Course Technology. The goal of this paper is to compare and contrast the article Cyber security in the Smart Grid: Survey and challenges by Wang and Lu with Chapter 1 and 2 of the book. The...

Words: 1934 - Pages: 8

Free Essay

Building an Access Control System

...Perimeter Defense 10/31/2013 When you are utilizing security features in an application, consideration should be given to the design, implementation, and deployment. It would helpful if you understand how a hacker thinks and then utilize the tools a hacker would use. Today, every company is becoming completely networked, through the exchanging of information on desktops, laptops, tablets and smart phones. Thinking like a hacker and understanding a hacker’s tactics and scams could make you aware and become more effective when applying countermeasures. There are several methods for carrying out ethical hacking, the most common are limited vulnerability and penetration testing. Limited vulnerability analysis, focus on entry points to gather critical systems and data. By understanding the basic approach used by hackers to target organizations, you will be better equipped to take defensive measures you will be better equipped and know what you are up against. There are steps involved in scanning a network, the following points will highlight them. 1) Check for live systems, 2) Check for open ports, 3) Fingerprint the operating system, 4) Scan for vulnerabilities, 5) Probe the network. Tools that can be used to detect scanning threats and countermeasures that a company can use to deter and avoid vulnerabilities are as follows. “Spoofing user identity -use strong authentication for passwords, do not store secrets (for example, passwords) in plaintext. Do not pass credentials in...

Words: 996 - Pages: 4

Premium Essay

Sec280 Devry Threats to Home Computer Systems

...Threats to Home Computer Systems I sometimes imagine a way of life as simple as sitting on a rock, watching the sky, tending to a cave. Could there have been anything complicated in those times, many millennia ago? In fact, there was: security. It must have been an enormous stressor to guard your cave dwelling from other primitive beings looking to gain something they were not entitled to. Maybe they suspected personal items such as weaponry or stored food, or to take a peek at your secret glyphs—directions to a source of something valuable. Today, we may not live in caves, and as such our secret information may be stored in sophisticated machinery rather than drawings on cave walls. However, human nature to steal and protect is still as common as it was in early humans. It was not so long ago that the home computer was in its primitive stage. In a few decades, this “advanced typewriter/calculator” has evolved into a way of life, along with its own set of threats to our security. These threats can be categorized as either software or behavioral, and can certainly be combined. Social engineering is a behavioral type of threat. It does not need to apply just to computers. Some social engineers call you on the telephone attempting to get you to reveal personal information, such as your social security number. But this can be done through email, as well. You may think the email is from someone you trust and you respond with information, such as passwords. Passwords, however...

Words: 945 - Pages: 4

Premium Essay

Vulnerability in Information

...21 page 21 page 21 page 20 page 20 page 20 page 21 White hat Black hat page 21 page 21 page 28 page 28 Dictionary cracking Brute-force computation Trust exploitation Port redirection page 28 page 29 page 30 Man-in-the-middle attack Social engineering Phishing page 30 page 30 2 Network Security 1 and 2 Companion Guide The Internet continues to grow exponentially. Personal, government, and business applications continue to multiply on the Internet, with immediate benefits to end users. However, these network-based applications and services can pose security risks to individuals and to the information resources of companies and governments. Information is an asset that must be protected. Without adequate network security, many individuals, businesses, and governments risk losing that asset. Network security is the process by which digital information assets are protected. The goals of network security are as follows: ■ ■ ■ Protect confidentiality Maintain integrity Ensure availability With this in mind, it is imperative that all networks be protected from threats and vulnerabilities for a business to achieve its fullest potential. Typically, these threats are persistent because of vulnerabilities, which can arise from the following: Note...

Words: 13317 - Pages: 54

Premium Essay

It 294 Chapter 1

...challenges of securing information 2 Objective 2: Define information security and explain why it is important 3 Objective 3: Identify the types of attackers that are common today 5 Hackers 5 Script Kiddies 5 Spies 5 Insiders 5 Cybercriminals 6 Cyberterrorists 6 Objective 4: List the basic steps of an attack 6 Objective 5: Describe the five basic principles of defense 7 Layering 7 Limiting 7 Diversity 7 Obscurity 8 Simplicity 8 Works Cited 8 Chapter 1 Objectives To accomplish the learning objectives for Chapter 1: • I have read all of Chapter 1 in the course textbook (pages 1-39); including understanding the key terms on (pages 28-29). • I have read and answered all of the review questions on (pages 29-32), then compared my decisions with the solutions posted on Canvas, any incorrect answers I corrected and confirmed in the chapter. • I have read and worked through Hands-On Projects 1-1 through 1-4 to facilitate in achieving each of the stated learning objectives. • I have read, worked through and evaluated Case Projects 1-1 through 1-8 on (pages 36-38). • I have participated in all class presentations and discussions about Chapter 1 • I have read through and examined Chapter1 slide presentations. The learning objectives for this chapter are as follows: Objective 1: Describe the challenges of securing information To achieve this objective, I have read in the course textbook (pages 5-11) Challenges of Securing Information including reviewing...

Words: 3169 - Pages: 13

Free Essay

Ceh Test Questions

...Exam : 312-50 Title : Ethical Hacker Certified Ver : 02-23-2009 312-50 QUESTION 1: What is the essential difference between an 'Ethical Hacker' and a 'Cracker'? A. The ethical hacker does not use the same techniques or skills as a cracker. B. The ethical hacker does it strictly for financial motives unlike a cracker. C. The ethical hacker has authorization from the owner of the target. D. The ethical hacker is just a cracker who is getting paid. Answer: C Explanation: The ethical hacker uses the same techniques and skills as a cracker and the motive is to find the security breaches before a cracker does. There is nothing that says that a cracker does not get paid for the work he does, a ethical hacker has the owners authorization and will get paid even if he does not succeed to penetrate the target. QUESTION 2: What does the term "Ethical Hacking" mean? A. Someone who is hacking for ethical reasons. B. Someone who is using his/her skills for ethical reasons. C. Someone who is using his/her skills for defensive purposes. D. Someone who is using his/her skills for offensive purposes. Answer: C Explanation: Ethical hacking is only about defending your self or your employer against malicious persons by using the same techniques and skills. QUESTION 3: Who is an Ethical Hacker? A. A person whohacksfor ethical reasons B. A person whohacksfor an ethical cause C. A person whohacksfor defensive purposes D. A person whohacksfor offensive purposes Answer:...

Words: 34575 - Pages: 139

Free Essay

Ethical Hacking

...in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Hands-On Ethical Hacking...

Words: 185373 - Pages: 742

Premium Essay

Security Analyst

...Contents 1. Introduction 2. Assessment Test 3. Chapter 1: Getting Started with Ethical Hacking 1. Hacking: A Short History 2. What Is an Ethical Hacker? 3. Summary 4. Exam Essentials 5. Review Questions 4. Chapter 2: System Fundamentals 1. Exploring Network Topologies 2. Working with the Open Systems Interconnection Model 3. Dissecting the TCP/IP Suite 4. IP Subnetting 5. Hexadecimal vs. Binary 6. Exploring TCP/IP Ports 7. Understanding Network Devices 8. Working with MAC Addresses 9. Intrusion Prevention and Intrusion Detection Systems 10. Network Security 11. Knowing Operating Systems 12. Backups and Archiving 13. Summary 14. Exam Essentials 15. Review Questions 5. Chapter 3: Cryptography 2 1. Cryptography: Early Applications and Examples 2. Cryptography in Action 3. Understanding Hashing 4. Issues with Cryptography 5. Applications of Cryptography 6. Summary 7. Exam Essentials 8. Review Questions 6. Chapter 4: Footprinting and Reconnaissance 1. Understanding the Steps of Ethical Hacking 2. What Is Footprinting? 3. Terminology in Footprinting 4. Threats Introduced by Footprinting 5. The Footprinting Process 6. Summary 7. Exam Essentials 8. Review Questions 7. Chapter 5: Scanning Networks 1. What Is Network Scanning? 2. Checking for Live Systems 3. Checking for Open Ports 4. Types of Scans 5. OS Fingerprinting 6. Banner Grabbing 7. Countermeasures 8. Vulnerability Scanning 9. Drawing Network Diagrams 10. Using Proxies 11. Summary 12. Exam Essentials 13. Review Questions...

Words: 71242 - Pages: 285

Premium Essay

Logistic: School Bus Routing

...objectives of this study is stated in an attempt to resolve the presenting issues. Thirdly, key definition of terms is addressed with reference to the school bus problem. Fourthly, a critical review of the literature whilst putting into perspective the methodologies adopted in research. Furthermore, findings from different approaches using computer programs to address the school bus problem are highlighted. In addition, a critical analysis of the school bus problem is attempted whilst putting into perspective transportation management systems, public policy and compliance, appreciation of public transport design and sustainable transport systems. An understanding and knowledge of UK based transport systems is demonstrated with an application to the case study problem. Lastly, limitations are acknowledged, recommendations and conclusions are drawn. Within this, future challenges relating to the school bus problem with reference to transportation systems are also highlighted. 2.0 STATEMENT OF THE PROBLEM The area covered in this study is Middleton LEA, Birmingham in West Midland United Kingdom. The scope of this study is scheduling of the school bus service to meet the demands of Middleton’s pupils. The key parameters and constraints evident in this study are: The Key Parameters: • The city has 269 schools with 8650...

Words: 3933 - Pages: 16